Skip to content

Commit c72830d

Browse files
committed
change "relying party" to "client"
for #169
1 parent 8d7bf3f commit c72830d

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

draft-ietf-oauth-v2-1.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2861,7 +2861,7 @@ If the status code 307 were used for redirection, the user agent
28612861
would send the user credentials via a POST request to the client.
28622862

28632863
This discloses the sensitive credentials to the client. If the
2864-
relying party is malicious, it can use the credentials to impersonate
2864+
client is malicious, it can use the credentials to impersonate
28652865
the user at the AS.
28662866

28672867
The behavior might be unexpected for developers, but is defined in
@@ -3836,7 +3836,7 @@ Below is a list of well-established extensions at the time of publication:
38363836

38373837
This specification is the work of the OAuth Working Group, and its starting point was based on the contents of the following specifications: OAuth 2.0 Authorization Framework (RFC 6749), OAuth 2.0 for Native Apps (RFC 8252), OAuth Security Best Current Practice, and OAuth 2.0 for Browser-Based Apps. The editors would like to thank everyone involved in the creation of those specifications upon which this is built.
38383838

3839-
The editors would also like to thank the following individuals for their ideas, feedback, corrections, and wording that helped shape this version of the specification: Vittorio Bertocci, Michael Jones, Justin Richer, Daniel Fett, Brian Campbell, Joseph Heenan, Roberto Polli, Andrii Deinega, Falko, Michael Peck, Bob Hamburg, Deng Chao, Karsten Meyer zu Selhausen, and Filip Skokan.
3839+
The editors would also like to thank the following individuals for their ideas, feedback, corrections, and wording that helped shape this version of the specification: Vittorio Bertocci, Michael Jones, Justin Richer, Daniel Fett, Brian Campbell, Joseph Heenan, Roberto Polli, Andrii Deinega, Falko, Michael Peck, Bob Hamburg, Deng Chao, Karsten Meyer zu Selhausen, Filip Skokan, and Tim Würtele.
38403840

38413841
Discussions around this specification have also occurred at the OAuth Security Workshop in 2021 and 2022. The authors thank the organizers of the workshop (Guido Schmitz, Steinar Noem, and Daniel Fett) for hosting an event that's conducive to collaboration and community input.
38423842

@@ -3850,6 +3850,7 @@ Discussions around this specification have also occurred at the OAuth Security W
38503850
* Updated language around client registration to better reflect alternative registration methods such as those in use by OpenID Federation and open ecosystems
38513851
* Added DPoP and Step-Up Auth to appendix of extensions
38523852
* Updated reference for case insensitivity of auth scheme to HTTP instead of ABNF
3853+
* Corrected an instance of "relying party" vs "client"
38533854

38543855
-11
38553856

0 commit comments

Comments
 (0)